Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: cur Clear Filter

Dyson Airwrap Co-anda 2x Review: Great, Not a Must-Have

Each attachment is embedded with RFID chips that auto-adjust heat and airflow based on your last-used settings. Not a revolutionary change, but it is nice not to have to toggle settings every time I switch attachments. You can also pair it with Dyson's app, which offers tutorials based on your hair type and goals. Dyson also moved the fan and heat controls to the base of the handle. It’s a cleaner look, but it can get finicky if you’re used to adjusting settings mid-styling. If you’ve already p

Computing’s Top 30: Zhihao “Zephyr” Yao

On a typical mobile device today, financial and medical apps nestled up next to everything from karaoke playlists to time-killing games like Fruit Ninja. How to secure data that matters in this diverse digital buffet is a challenge for many researchers. For Zhihao “Zephyr” Yao, it’s a challenge that fuels his life’s work and also led to an award-winning project. That project—which earned ACM MobiSys 2023’s Best Artifact Award—demonstrated that making systems less complex can actually enhance m

Canada’s House of Commons investigating data breach after cyberattack

The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament of Canada has yet to issue a public statement regarding this incident, CBC News reports that House of Commons staff were notified of a breach on Monday via email. The alert states that the attacker exploited a recent Microsoft vulnerability to gain access to a database containing sensitive informat

Microsoft patches more than 100 Windows security flaws - update your PC now

Elyse Betters Picaro / ZDNET ZDNET's key takeaways The August Patch Tuesday update for Windows fixes 107 security flaws. Among all the security flaws, 13 are ranked as critical. Also adds the new Black Screen of Death and Quick Machine Recovery. Microsoft's August Patch Tuesday update adds a couple of cool new features. But the main reason you'll want to install it is to squash a large array of security bugs. Patches 107 flaws, including 13 critical Released this past Tuesday, the latest

CISA warns of N-able N-central flaws exploited in zero-day attacks

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and management (RMM) platform. N-central is commonly used by managed services providers (MSPs) and IT departments to monitor, manage, and maintain client networks and devices from a centralized web-based console. According to CISA, the two flaws can allow threat actors to gain command execution via an insecure deserialization weakness (CVE-2025-8875) and inject

Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild

Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates. FortiSIEM is a central security monitoring and analytics system used for logging, network telemetry, and security incident alerts, serving as an integral part of security operation centers, where it's an essential tool in the hands of IT ops teams and analysts. The product is generally used by governments,

Report: Apple planning ecosystem of home security devices to compete with Ring and Nest

A new report from Bloomberg dives deep into Apple’s plans to lean on artificial intelligence as a way to expand into robotics, home security, and smart displays. One interesting tidbit in the report is that Apple is aiming to develop a system of smart home cameras and other home security products to compete with the likes of Amazon’s Ring brand. Bloomberg first reported that Apple was developing a home doorbell with support for Face ID last December. As it turns out, the company’s ambitions ex

What's Your Curl Type? (2025)

Like, for instance, how to brush them. My mother has straight hair and didn't quite understand how to deal with my curls when I was a child, so she would deal with unruly hair the only way she knew how: by brushing it. As a result, I look like a poodle in nearly every one of my elementary school photos. According to Syed, brushing and combing curly hair is OK—but only when the hair is wet. Unsurprisingly, pin-straight Type 1 hair is the easiest to comb or brush. However, Type 4 hair is not four

Topics: curly hair says syed type

Supporting org.apache.xml.security in graalVM

Supporting org.apache.xml.security in graalVM When working today at out european trusted lists feature $DAY_JOB we had an issue which was coming from org.apache.xml.security when trying to run our testsuite natively compiled with graalVM. java.util.MissingResourceException: Can't find bundle for base name org/apache/xml/security/resource/xmlsecurity locale en_US -H:IncludeResourceBundles=org.apache.xml.security.resource.xmlsecurity org.apache.xml.security.signature.XMLSignatureException: The

When DEF CON partners with the U.S. Army

DEF CON founder Jeff “Dark Tangent” Moss (left) downing a jello shot and shouting “Go Army” at the end of his fireside chat with former National Security Agency director Paul M. Nakasone (right) on Friday. The previously imprisoned hacktivist Jeremy Hammond was ejected from the conference shortly afterward, yelling “Free Palestine!” Amidst a backdrop of continually airborne beach balls and a remix of the indie rock hit “Heads Will Roll,” entrants to the ‘Arcade Party’ on the second floor of the

The end of perimeter defense: When your own AI tools become the threat actor

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Russia’s APT28 is actively deploying LLM-powered malware against Ukraine, while underground platforms are selling the same capabilities to anyone for $250 per month. Last month, Ukraine’s CERT-UA documented LAMEHUG, the first confirmed deployment of LLM-powered malware in the wild. The malware, attributed to APT28, utilizes stolen Hugging

Android's pKVM hypervisor earns SESIP Level 5 security certification

Google announced that its protected Kernel-based Virtual Machine (pKVM) for Android has achieved SESIP Level 5 certification, the highest security assurance level for IoT and mobile platforms. The pKVM is the hypervisor underpinning the Android Virtualization Framework (AVF), providing an isolated, high-assurance environment for executing critical workloads. These include Google's AI models like Gemini Nano for local personal data processing, biometric authentication (face, fingerprint), DRM co

US govt seizes $1 million in crypto from BlackSuit ransomware gang

The U.S. Department of Justice (DoJ) seized cryptocurrency and digital assets worth $1,091,453 at the time of confiscation, on January 9, 2024, from the BlackSuit ransomware gang. The authorities tracked the crypto as the cybercriminals moved it repeatedly across virtual currency exchange accounts, depositing and withdrawing it to obfuscate the trace. Eventually, the amount was frozen when it reached a cooperating exchange. The action was made possible thanks to evidence collected by the U.S.

Best Home Security Cameras With Floodlights in 2025: Illuminate Your Yard

Does the camera have night vision? Does it have extra features like color night vision? Does the floodlight camera have adjustable motion detection? Does it have motion zones or sensitivity options? Does it include objection recognition for people? Are there extra costs for these features? Do you prefer a wired or wireless camera? Do you have a junction box where you want to install a wired camera or are you willing to have one installed? Can you control the brightness of the camera's floodli

Blackwater’s founder would like to sell you a privacy phone made in the USA

Unplugged, a company cofounded and backed by Erik Prince, who is also the founder of infamous private military contractor Blackwater, has just released a new version of its “privacy-first” UP Phone that will be made in the US — at some point. The original UP Phone was described by the company as “the ultimate privacy-focused smartphone” and by privacy platform GrapheneOS as “a clear cut scam.” (It was first announced in June 2022, though it didn’t reach customers until 2024; Unplugged wouldn’t

A Unified Approach to Branch Security and SD-WAN: Streamlining Operations

The way we work has fundamentally shifted, with hybrid and remote models becoming a widespread reality. This evolution brings tremendous benefits but also presents significant challenges for IT and security teams tasked with ensuring seamless access to applications and protecting sensitive data outside the traditional corporate perimeter. Traditionally, network deployments often routed all internet traffic back to a central site through a perimeter firewall. While this provided security, backha

The ex-CIA agents deciding Facebook's content policy (2022)

It is an uncomfortable job for anyone trying to draw the line between “harmful content and protecting freedom of speech. It’s a balance”, Aaron says. In this official Facebook video, Aaron identifies himself as the manager of “the team that writes the rules for Facebook”, determining “what is acceptable and what is not.” Thus, he and his team effectively decide what content the platform’s 2.9 billion active users see and what they don’t see. Aaron is being interviewed in a bright warehouse-turn

275M patient records breached—How to meet HIPAA password manager requirements

In 2024, the healthcare sector experienced over 700 data breach incidents, which is higher than any other industry, including finance. These breaches exposed more than 275 million patient records, with password-related vulnerabilities serving as the primary attack vector in most of the cases. While threat actors use various penetration methods, compromised credentials remain the most consistent and damaging entry point. These statistics reflect a fundamental threat to patient and organizationa

Trump strikes “wild” deal making US firms pay 15% tax on China chip sales

Ahead of an August 12 deadline for a US-China trade deal, Donald Trump's tactics continue to confuse those trying to assess the country's national security priorities regarding its biggest geopolitical rival. For months, Trump has kicked the can down the road regarding a TikTok ban, allowing the app to continue operating despite supposedly urgent national security concerns that China may be using the app to spy on Americans. And now, in the latest baffling move, a US official announced Monday t

Cutting Through the Security Noise: How XDR helps Teams Focus on Real Threats

Extended Detection and Response (XDR) is a modern security technology designed primarily as a Security Operations Centre (SOC) enabler tool. It addresses the complexities and challenges faced by security teams in today’s evolving threat landscape. The core idea behind XDR is to take challenging incident response processes and make security analysts more effective, even at more junior levels. The term XDR itself has emerged over the last few years and can be seen as somewhat nebulous, with diffe

Designing Software in the Large

Designing Software in the Large Software75 Jul 22, 2025 – Filed as: A Philosophy of Software Design is my favorite book I’ve read to date about designing large long-lived maintainable software programs. Here’s what I learned: Complexity Complexity is anything related to the structure of a software system that makes it hard to understand & modify the system. Symptoms of complexity: Change Amplification - A seemingly simple change requires code modifications in many different places. High Cog

Hyundai wants Ioniq 5 owners to pay to fix a keyless entry security hole

is a senior editor and author of Notepad , who has been covering all things Microsoft, PC, and tech for over 20 years. Posts from this author will be added to your daily email digest and your homepage feed. Hyundai is now offering an “optional” security upgrade for the Ioniq 5 in the UK that prevents the car being stolen with a Game Boy-like device. Hyundai wants some Ioniq 5 owners to pay a £49 ($65) to upgrade hardware and software components to prevent thieves using handheld devices to unlo

Events

Events are things that happen in the system you are programming — the system produces (or "fires") a signal of some kind when an event occurs, and provides a mechanism by which an action can be automatically taken (that is, some code running) when the event occurs. Events are fired inside the browser window, and tend to be attached to a specific item that resides in it. This might be a single element, a set of elements, the HTML document loaded in the current tab, or the entire browser window. T

Viral Myanmar Earthquake Video Shows First Visual Evidence of Rare Seismic Phenomena

In May, we reported on a first-of-its-kind video that captured surface rupture during Myanmar’s devastating 7.7 magnitude earthquake. While the YouTube video now has 1.6 million views, two geophysicists spotted something many people probably didn’t notice. The video seems like a gift that just keeps on giving. As the Kyoto University scientists explain in a study published last month in The Seismic Record, it also includes the first direct visual evidence of pulse-like rupturing and a curved fa

Encryption made for police and military radios may be easily cracked

Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for

Debugging a mysterious HTTP streaming issue

The Problem We recently encountered a frustrating issue with HTTP response streaming at Mintlify. Our system uses the AI SDK with the Node stream API to forward streams, and suddenly things stopped working properly. The symptoms were confusing: streaming worked perfectly with cURL and Postman, but failed completely with node-fetch and browser fetch. ‍ Initial Investigation Our first hypothesis centered around stream compatibility issues. We suspected the problem might be related to how the AI

Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

The Trump administration's radical changes to United States fiscal policy, foreign relations, and global strategy—combined with mass firings across the federal government—have created uncertainty around US cybersecurity priorities that was on display this week at two of the country's most prominent digital security conferences in Las Vegas. “We are not retreating, we're advancing in a new direction,” Cybersecurity and Infrastructure Security Agency chief information officer Robert Costello said

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. “Customer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,” he writes. “We expect to have new locks on the market by the end of the year.” Photograph: Ronda Churchill In a followup call, Securam director of sales Jeremy Brookes confirmed that Securam has no plan to fix the vulnerabil